Chapter 7. Denial of Service and Session Hijacking

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • Understand the types of DoS attacks

  • Understand how a DDoS attack works

  • Understand how BOTs/BOTNETs work

  • What is a "smurf" attack?

  • What is "SYN" flooding?

  • Describe the DoS/DDoS countermeasures

  • Understand spoofing vs. hijacking

  • List the types of session hijacking

  • Understand sequence prediction

  • What are the steps in performing session hijacking?

  • Describe how you would prevent session hijacking

Denial of Service and Session Hijacking

Session hijacking is a hacking method that creates a temporary DoS for an end user when an attacker takes over the session. Session hijacking is used by hackers to take over a ...

Get CEH® Certified Ethical Hacker Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.